An Efficient Data Protection Architecture Based on Fragmentation and Encryption

03/13/2018
by   Han Qiu, et al.
0

In this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection.

READ FULL TEXT

page 1

page 34

research
07/01/2018

Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

Full Disk Encryption (FDE) has become a widely used security feature. Al...
research
04/17/2019

Privacy-preserving Health Data Sharing for Medical Cyber-Physical Systems

The recent spades of cyber security attacks have compromised end users' ...
research
01/23/2022

A Survey on Patients Privacy Protection with Stganography and Visual Encryption

In this survey, thirty models for steganography and visual encryption me...
research
01/23/2019

Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure

Rivest's seminal paper introduced the first All-Or-Nothing (AON) method ...
research
05/29/2021

Revisiting Challenges for Selective Data Protection of Real Applications

Selective data protection is a promising technique to defend against the...
research
05/26/2021

Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services

Model protection is vital when deploying Convolutional Neural Networks (...
research
01/12/2022

Diffix Elm: Simple Diffix

Historically, strong data anonymization requires substantial domain expe...

Please sign up or login with your details

Forgot password? Click here to reset